FIPS 140-2 Non- Proprietary Security Policy. McAfee SIEM Cryptographic Module, Version 1.0



Similar documents
Symantec Corporation Symantec Enterprise Vault Cryptographic Module Software Version:

Secure Network Communications FIPS Non Proprietary Security Policy

FIPS Non-Proprietary Security Policy. IBM Internet Security Systems SiteProtector Cryptographic Module (Version 1.0)

Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc.

Pulse Secure, LLC. January 9, 2015

Symantec Mobility: Suite Server Cryptographic Module

FIPS Non Proprietary Security Policy: Kingston Technology DataTraveler DT4000 Series USB Flash Drive

FIPS Non Proprietary Security Policy: IBM Internet Security Systems Proventia GX Series Security

FIPS Non Proprietary Security Policy: IBM Internet Security Systems Proventia GX Series Security

VMware, Inc. VMware Java JCE (Java Cryptographic Extension) Module

Secure File Transfer Appliance Security Policy Document Version 1.9. Accellion, Inc.

Nortel Networks, Inc. VPN Client Software (Software Version: 7_11.101) FIPS Non-Proprietary Security Policy

Northrop Grumman M5 Network Security SCS Linux Kernel Cryptographic Services. FIPS Security Policy Version

Kaseya US Sales, LLC Virtual System Administrator Cryptographic Module Software Version: 1.0

SecureDoc Disk Encryption Cryptographic Engine

SkyRecon Cryptographic Module (SCM)

FIPS Security Policy. for Motorola, Inc. Motorola Wireless Fusion on Windows CE Cryptographic Module

RSA BSAFE. Crypto-C Micro Edition for MFP SW Platform (psos) Security Policy. Version , October 22, 2012

SECUDE AG. FinallySecure Enterprise Cryptographic Module. FIPS Security Policy

OpenSSL FIPS Security Policy Version 1.1.1b

OpenSSL FIPS Security Policy Version 1.2.4

FIPS Security Policy LogRhythm Log Manager

FIPS Level 1 Security Policy for Cisco Secure ACS FIPS Module

13135 Lee Jackson Memorial Hwy., Suite 220 Fairfax, VA United States of America

FIPS Security Policy LogRhythm or Windows System Monitor Agent

VASCO Data Security International, Inc. DIGIPASS GO-7. FIPS Non-Proprietary Cryptographic Module Security Policy

NitroGuard Intrusion Prevention System Version and Security Policy

Security Policy. Trapeze Networks

Windows Server 2008 R2 Boot Manager Security Policy For FIPS Validation

1C - FIPS Cisco VPN Client Security Policy

FIPS Security Policy

FIPS Security Policy 3Com Embedded Firewall PCI Cards

JUNOS-FIPS-L2 Cryptographic Module Security Policy Document Version 1.3

FIPS SECURITY POLICY FOR

Security Policy for FIPS Validation

FIPS Documentation: Security Policy 05/06/ :21 AM. Windows CE and Windows Mobile Operating System. Abstract

Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST

Network Security Services (NSS) Cryptographic Module Version

SNAPcell Security Policy Document Version 1.7. Snapshield

FIPS Non-Proprietary Security Policy. FIPS Security Level: 2 Document Version: 0.9

FIPS Security Policy

Certicom Security for Government Suppliers developing client-side products to meet the US Government FIPS security requirement

HEWLETT PACKARD TIPPINGPOINT. FIPS NON PROPRIETARY SECURITY POLICY HP TippingPoint Security Management System

Cisco Telepresence C40, C60, and C90 Codecs (Firmware Version: TC5.0.2) (Hardware Version: v1) FIPS Non-Proprietary Security Policy

An Introduction to Cryptography as Applied to the Smart Grid

HP LTO-6 Tape Drive Level 1 Security Policy

OpenSSL FIPS Security Policy Version 1.2.2

Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths

SECURE USB FLASH DRIVE. Non-Proprietary Security Policy

McAfee Firewall Enterprise 8.2.1

OpenSSL FIPS Security Policy Version 1.2.3

Security Policy: Key Management Facility Crypto Card (KMF CC)

SafeEnterprise TM ATM Encryptor II Model 600 FIPS Level 3 Validation Non-Proprietary Security Policy

Security Policy, DLP Cinema, Series 2 Enigma Link Decryptor

McAfee Firewall Enterprise 8.3.1

MOTOROLA ACCOMPLI 009 PERSONAL COMMUNICATOR MODULE OVERVIEW SCOPE OF DOCUMENT. Security Policy REV 1.2, 10/2002

RELEASE NOTES. Table of Contents. Scope of the Document. [Latest Official] ADYTON Release corrections. ADYTON Release 2.12.

Certification Report

Security Policy for Oracle Advanced Security Option Cryptographic Module

TANDBERG MXP Codec (Firmware Version: F6.0) FIPS Non-Proprietary Security Policy

How To Encrypt Data With Encryption

Secure Computing Corporation Secure Firewall (Sidewinder) 2150E (Hardware Version: 2150 with SecureOS v )

NIST Cryptographic Algorithm Validation Program (CAVP) Certifications for Freescale Cryptographic Accelerators

Windows Server 2003 Enhanced Cryptographic Provider (RSAENH)

Windows Server 2003 Enhanced Cryptographic Provider (RSAENH)

Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

SPC5-CRYP-LIB. SPC5 Software Cryptography Library. Description. Features. SHA-512 Random engine based on DRBG-AES-128

Athena Smartcard Inc. IDProtect Key with LASER PKI FIPS Cryptographic Module Security Policy. Document Version: 1.0 Date: April 25, 2012

User Guide. FIPS Mode. For use with epolicy Orchestrator 4.6.x Software

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

DRAFT Standard Statement Encryption

A COMPARISON OF THE SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES IN FIPS AND FIPS 140-2

Archived NIST Technical Series Publication

FIPS SECURITY POLICY

Cryptographic and Security Testing Laboratory. Deputy Laboratory Director, CST Laboratory Manager

FIPS SECURITY POLICY

WebSphere DataPower Release FIPS and NIST SP a support.

Using BroadSAFE TM Technology 07/18/05

Certification Report

SMPTE Standards Transition Issues for NIST/FIPS Requirements v1.1

UM0586 User manual. STM32 Cryptographic Library. Introduction

Security Policy Revision Date: 23 April 2009

Apple Cryptographic Service Provider Functional Specification

How To Protect Your Computer From Attack

Certification Report

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213

Cisco Catalyst 3560-X and 3750-X Switches FIPS Level 2 Non-Proprietary Security Policy

FIPS Security Policy for WatchGuard XTM

Guide to Data Field Encryption

MOTOROLA MESSAGING SERVER SERVER AND MOTOROLA MYMAIL DESKTOP PLUS MODULE OVERVIEW. Security Policy REV 1.3, 10/2002

Savitribai Phule Pune University

Overview. SSL Cryptography Overview CHAPTER 1

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

SUSE Linux Enterprise 12 Security Certifications Common Criteria, EAL, FIPS, PCI DSS,... What's All This About?

Blue Coat Systems, Inc. Secure Web Gateway Virtual Appliance-V100 Software Version: FIPS Non-Proprietary Security Policy

Applying Cryptography as a Service to Mobile Applications

Transcription:

FIPS 40-2 Non- Proprietary Security Policy McAfee SIEM Cryptographic Module, Version.0 Document Version.4 December 2, 203 Document Version.4 McAfee Page of 6

Prepared For: Prepared By: McAfee, Inc. 282 Mission College Blvd. Santa Clara, CA 95054 www.mcafee.com Apex Assurance Group, LLC 530 Lytton Avenue, Ste. 200 Palo Alto, CA 9430 www.apexassurance.com Abstract This document provides a non- proprietary FIPS 40-2 Security Policy for the McAfee SIEM Cryptographic Module, Version.0. Document Version.4 McAfee Page 2 of 6

Table of Contents Introduction... 5. About FIPS 40... 5.2 About this Document... 5.3 External Resources... 5.4 Notices... 5.5 Acronyms... 5 2 McAfee SIEM Cryptographic Module, Version.0... 7 2. Cryptographic Module Specification... 7 2.. Validation Level Detail... 7 2..2 Approved Cryptographic Algorithms... 7 2..3 Non- Approved Cryptographic Algorithms... 8 2.2 Module Interfaces... 8 2.3 Roles, Services, and Authentication... 9 2.3. Operator Services and Descriptions... 0 2.3.2 Operator Authentication... 2.4 Physical Security... 2.5 Operational Environment... 2.6 Cryptographic Key Management... 2.6. Random Number Generation... 3 2.6.2 Key/Critical Security Parameter (CSP) Authorized Access and Use by Role and Service/Function... 3 2.6.3 Key/CSP Storage... 3 2.7 Self- Tests... 3 2.7. Power- On Self- Tests... 4 2.7.2 Conditional Self- Tests... 4 2.7.3 Cryptographic Function... 4 2.8 Mitigation of Other Attacks... 5 3 Guidance and Secure Operation... 6 3. Crypto Guidance... 6 3.. Software Installation... 6 3.2 User Guidance... 6 3.2. General Guidance... 6 Document Version.4 McAfee Page 3 of 6

List of Tables Table Acronyms and Terms... 6 Table 2 Validation Level by FIPS 40-2 Section... 7 Table 3 FIPS- Approved Algorithm Certificates... 8 Table 4 Logical Interface / Physical Interface Mapping... 9 Table 5 Role Descriptions... 0 Table 6 Module Services and Descriptions... Table 7 Module Keys/CSPs... 2 Table 8 Power- On Self- Tests... 4 Table 9 Conditional Self- Tests... 4 List of Figures Figure Module Boundary and Interfaces Diagram... 9 Document Version.4 McAfee Page 4 of 6

Introduction. About FIPS 40 Federal Information Processing Standards Publication 40-2 Security Requirements for Cryptographic Modules specifies requirements for cryptographic modules to be deployed in a Sensitive but Unclassified environment. The National Institute of Standards and Technology (NIST) and Communications Security Establishment of Canada (CSEC) Cryptographic Module Validation Program (CMVP) runs the FIPS 40 program. The CMVP accredits independent testing labs to perform FIPS 40 testing; the CMVP also validates test reports for modules meeting FIPS 40 validation. Validated is the term given to a module that meets the FIPS 40 criteria. More information is available on the CMVP website at http://csrc.nist.gov/groups/stm/cmvp/index.html..2 About this Document This non- proprietary Cryptographic Module Security Policy for the McAfee SIEM Cryptographic Module, Version.0 from McAfee provides an overview of the product and a high- level description of how it meets the security requirements of FIPS 40-2. This document contains details on the module s cryptographic keys and critical security s. This Security Policy concludes with instructions and guidance on running the module in a FIPS 40-2 mode of operation. The McAfee SIEM Cryptographic Module, Version.0 may also be referred to as the module in this document..3 External Resources The McAfee website (http://www.mcafee.com) contains information on McAfee products. The Cryptographic Module Validation Program website (http://csrc.nist.gov/groups/stm/cavp/validation.html) contains links to the FIPS 40-2 certificate and McAfee contact information..4 Notices This document may be freely reproduced and distributed in its entirety without modification..5 Acronyms The following table defines acronyms found in this document: Document Version.4 McAfee Page 5 of 6

Acronym Term AES Advanced Encryption Standard ANSI American National Standards Institute API Application Programming Interface CMVP Cryptographic Module Validation Program CO Crypto CSEC Communications Security Establishment Canada CSP Critical Security Parameter DES Data Encryption Standard DH Diffie- Hellman DSA Digital Signature Algorithm EMC Electromagnetic Compatibility EMI Electromagnetic Interference FCC Federal Communications Commission FIPS Federal Information Processing Standard GPC General Purpose Computer GUI Graphical User Interface HMAC (Keyed- ) Hash Message Authentication Code KAT Known Answer Test MAC Message Authentication Code MD Message Digest NIST National Institute of Standards and Technology OS Operating System PKCS Public- Key Cryptography Standards PRNG Pseudo Random Number Generator PSS Probabilistic Signature Scheme RNG Random Number Generator RSA Rivest, Shamir, and Adleman SIEM Security Information and Event Management SHA Secure Hash Algorithm SSL Secure Sockets Layer TDES Triple Data Encryption Algorithm TLS Transport Layer Security USB Universal Serial Bus Table Acronyms and Terms Document Version.4 McAfee Page 6 of 6

2 McAfee SIEM Cryptographic Module, Version.0 2. Cryptographic Module Specification The module, the McAfee SIEM Cryptographic Module, Version.0, is a software module that provides cryptographic services required by the McAfee SIEM appliances. The module is a multi- chip standalone embodiment installed on McAfee SIEM hardware. All operations of the module occur via calls from the McAfee SIEM applications and their respective internal daemons/processes. As such there are no untrusted services calling the services of the module. 2.. Validation Level Detail The following table lists the level of validation for each area in FIPS 40-2: FIPS 40-2 Section Title Cryptographic Module Specification Cryptographic Module Ports and Interfaces Roles, Services, and Authentication Finite State Model Physical Security Operational Environment Cryptographic Key Management Electromagnetic Interference / Electromagnetic Compatibility Self- Tests Design Assurance Mitigation of Other Attacks Table 2 Validation Level by FIPS 40-2 Section Validation Level N/A N/A 2..2 Approved Cryptographic Algorithms The module s cryptographic algorithm implementations have received the following certificate numbers from the Cryptographic Algorithm Validation Program: Algorithm 32- bit CAVP Certificate 64- bit AES 2229 2230 Triple- DES 395 396 DSA 690 69 ECDSA 343 344 RNG 5 6 RSA 4 42 SHS 97 98 Document Version.4 McAfee Page 7 of 6

HMAC 357 358 CVL 33 34 Table 3 FIPS- Approved Algorithm Certificates Keys generated by this module using these algorithms are limited to a maximum of 60 bits of encryption strength. 2..3 Non- Approved Cryptographic Algorithms The module supports the following non- FIPS 40-2 approved but allowed algorithms: Diffie- Hellman with key sizes of 024-0000 bits (key agreement and key establishment methodology provides between 80 and 60 bits of encryption strength) MD5 (for use in TLS only) RSA with a key size of 2048 bits (key wrapping; key establishment provides 2 bits of encryption strength) 2.2 Module Interfaces The figure below shows the module s physical and logical block diagram: Power Physical Boundary McAfee SIEM Appliance Hard Drive Power Supply Display Controller Keyboard Interface Mouse Interface Status Output Control Input System Bus / Mother Board CPU Physical Interfaces Serial Interface Parallel Interface System Memory Network Interface Data Input McAfee Nitro Linux v9. Data Output SIEM Application McAfee SIEM Cryptographic Module (FIPS 40-2 Logical Boundary) = Plaintext = Ciphertext = Logical Boundary Document Version.4 McAfee Page 8 of 6

Figure Module Boundary and Interfaces Diagram The interfaces (ports) for the physical boundary could include the computer keyboard port, CDROM drive, floppy disk, mouse, network port, parallel port, USB ports, monitor port and power plug. When operational, the module does not transmit any information across these physical ports because it is a software cryptographic module. Therefore, the module s interfaces are purely logical and are provided through the Application Programming Interface (API) that a calling daemon can operate. The logical interfaces expose services that applications directly call, and the API provides functions that may be called by a referencing application (see Section 2.3 Roles, Services, and Authentication for the list of available functions). The module distinguishes between logical interfaces by logically separating the information according to the defined API. The API provided by the module is mapped onto the FIPS 40-2 logical interfaces: data input, data output, control input, and status output. Each of the FIPS 40-2 logical interfaces relates to the module's callable interface, as follows: FIPS 40-2 Interface Logical Interface Module Physical Interface Data Input Input s of API function Network Interface calls Data Output Output s of API function calls Network Interface Control Input API function calls Keyboard Interface, Mouse Interface Status Output For FIPS mode, function calls Display Controller returning status information and return codes provided by API function calls. Power Power Supply Table 4 Logical Interface / Physical Interface Mapping As shown in Figure Module Boundary and Interfaces Diagram and Table 6 Module Services and Descriptions, the output data path is provided by the data interfaces and is logically disconnected from processes performing key generation or zeroization. No key information will be output through the data output interface when the module zeroizes keys. 2.3 Roles, Services, and Authentication The module supports a Crypto and a User role. The module does not support a Maintenance role. The supported role definitions are as follows: Role Services Document Version.4 McAfee Page 9 of 6

Role User Crypto Table 5 Role Descriptions Services Encryption, Decryption (symmetric and public/private), Key Transport, Digital Signature, Symmetric Key Generation, TLS, Key agreement (TLS and Asymmetric), Keyed Hash, Message Digest, Random Numbers, Show Status, Self- test, and Zeroize All User services plus Module Initialization. The User and Crypto- roles are implicitly assumed by the entity accessing services implemented by the Module. 2.3. Operator Services and Descriptions The module supports services that are available to users in the various roles. The following table shows the services available to the various roles and the access to cryptographic keys and CSPs resulting from services: Service Roles CSP / Algorithm Permission Symmetric encryption/de AES Key, TDES Key cryption Key transport RSA Private Key Digital signature RSA Private Key, DSA Private Key Symmetric key generation AES Key, TDES Key TLS AES Key, TDES Key, RSA Public Key, RSA Private Key, HMAC Key TLS Key Agreement Asymmetric key generation Keyed Hash (HMAC) Message digest (SHS) Random number generation Show status Module initialization AES Key, TDES Key, RSA Public Key, RSA Private Key, HMAC Key, DH Private Key, DH Public Key RSA Private Key, DSA Private Key HMAC Key HMAC SHA- SHA- PRNG Seed and Seed Key none execute Crypto none CO: execute Document Version.4 McAfee Page 0 of 6

Service Roles CSP / Algorithm Permission Integrity test Integrity Key (HMAC SHA- ) read/execute On- Demand Self Test All CSPs Zeroize All CSPs Table 6 Module Services and Descriptions 2.3.2 Operator Authentication As required by FIPS 40-2, there are two roles (a Crypto role and User role) in the module that operators may assume. As allowed by Level, the module does not support authentication to access services. 2.4 Physical Security This section of requirements does not apply to this module. The module is a software- only module and does not implement any physical security mechanisms. 2.5 Operational Environment The module was tested on a McAfee SIEM Appliance (single- user mode) with Intel Xeon processor running McAfee Nitro OS 9. (32- bit and 64- bit). Compliance is maintained for other versions of the respective operating system s family where the binary is unchanged. The platform(s) used during testing met Federal Communications Commission (FCC) FCC Electromagnetic Interference (EMI) and Electromagnetic Compatibility (EMC) requirements for business use as defined by 47 Code of Federal Regulations, Part5, Subpart B. FIPS 40-2 validation compliance is maintained when the module is operated on other platforms where the binary is unchanged. 2.6 Cryptographic Key Management The table below provides a complete list of Critical Security Parameters used within the module: Keys and CSPs Storage Storage Input Locations Method Method AES Key RAM Plaintext API call Output Method Zeroization Access Document Version.4 McAfee Page of 6

Keys and CSPs Storage Storage Input Locations Method Method TDES Key RAM Plaintext API call RSA Public Key RAM Plaintext API call RSA Private Key RAM Plaintext API call DSA Public Key RAM Plaintext API call DSA Private Key RAM Plaintext API call Output Method Zeroization ECDSA Public Key RAM Plaintext ECDSA Private Key RAM Plaintext HMAC Key RAM Plaintext API call PRNG Seed RAM Plaintext API call PRNG Seed Key RAM Plaintext API call Integrity Key RAM Plaintext DH Private Key RAM Plaintext API call DH Public Key RAM Plaintext API call R = Read W = Write D = Delete Access Table 7 Module Keys/CSPs Document Version.4 McAfee Page 2 of 6

The application that uses the module is responsible for appropriate destruction and zeroization of the key material. The library provides functions for key allocation and destruction which overwrites the memory that is occupied by the key information with zeros before it is deallocated. 2.6. Random Number Generation The module employs an ANSI X9.3- compliant random number generator for creation of asymmetric and symmetric keys. The module accepts results from /dev/urandom (which is outside the cryptographic boundary) as an entropy source of random numbers for PRNG seeds. The module performs continual tests on the random numbers it uses to ensure that the seed and seed key input to the Approved PRNG do not have the same value. The module also performs continual tests on the output of the approved PRNG to ensure that consecutive random numbers do not repeat. The module generates cryptographic keys whose strengths are modified by available entropy. No assurance of the minimum strength of generated keys. 2.6.2 Key/Critical Security Parameter (CSP) Authorized Access and Use by Role and Service/Function An authorized application as user (the User role) has access to all key data generated during the operation of the Module. 2.6.3 Key/CSP Storage Public and private keys are provided to the Module by the calling process, and are destroyed when released by the appropriate API function calls. The Module does not perform persistent storage of keys. Key/CSP Zeroization The memory occupied by keys is allocated by openssl mem.c and OPENSSL_malloc()/cleanse(). The application is responsible for calling the appropriate destruction functions from the API. The destruction functions then overwrite the memory occupied by keys with zeros and deallocates the memory with the call. 2.7 Self- Tests FIPS 40-2 requires that the module perform self- tests to ensure the integrity of the module and the correctness of the cryptographic functionality at start up. In addition some functions require continuous verification of function, such as the random number generator. All of these tests are listed and described in this section. In the event of a self- test error, the module will log the error and will halt. The module must be initialized into memory to resume function. The following sections discuss the module s self- tests in more detail. Document Version.4 McAfee Page 3 of 6

2.7. Power- On Self- Tests Power- on self- tests are executed automatically when the module is loaded into memory. The FIPS_mode_set() function verifies the integrity of the runtime executable using a HMAC SHA- digest computed at build time. If the digest match, the power- up self- tests are then performed. If the power- up self- test is successful, FIPS_mode_set() sets the FIPS_mode flag to TRUE and the Module is in FIPS mode. TYPE DETAIL Known Answer Tests AES encrypt/decrypt PRNG RSA TDES encrypt/decrypt ECC CDH Pair- wise Consistency Tests DSA ECDSA Module integrity HMAC- SHA- Table 8 Power- On Self- Tests Input, output, and cryptographic functions cannot be performed while the Module is in a self- test or error state because the module is single- threaded and will not return to the calling application until the power- up self tests are complete. If the power- up self- tests fail, subsequent calls to the module will also fail - thus no further cryptographic operations are possible. 2.7.2 Conditional Self- Tests The module implements the following conditional self- tests upon key generation, or random number generation (respectively): TYPE DETAIL Pair- wise Consistency Tests DSA ECDSA RSA Continuous RNG Test Performed on approved PRNG Table 9 Conditional Self- Tests 2.7.3 Cryptographic Function A single initialization call, FIPS_mode_set, is required to initialize the Module for operation in the FIPS 40-2 Approved mode. When the Module is in FIPS mode, all security functions and cryptographic algorithms are performed in Approved mode. The FIPS mode initialization is performed when the application invokes the FIPS_mode_set() call which returns a for success or a 0 for failure. The module will support either explicit FIPS mode initialization through the FIPS_mode_set() function or implicit initialization by querying the /proc/sys/crypto/fips_enabled flag. If the flag is set and the module is being initialized, it will Document Version.4 McAfee Page 4 of 6

automatically call FIPS_mode_set() during this initialization. Prior to this invocation the Module is uninitialized. The FIPS_mode_set() function verifies the integrity of the runtime executable using a HMAC SHA- digest which is computed at build time. If this computed HMAC SHA- digest matches the stored, known digest, then the power- up self- test (consisting of the algorithm- specific Pairwise Consistency and Known Answer tests) is performed. If any component of the power- up self- test fails, an internal global error flag is set to prevent subsequent invocation of any cryptographic function calls. Any such power- up self- test failure is a hard error that can only be recovered by reinstalling the module. If all components of the power- up self- test are successful, then the module is in FIPS mode. The power- up self- tests may be performed at any time by reloading the module. No operator intervention is required during the running of the self- tests. 2.8 Mitigation of Other Attacks The Module does not contain additional security mechanisms beyond the requirements for FIPS 40-2 Level cryptographic modules. The FIPS_mode_set() function could be re- invoked but such re- invocation does not provide a means from recovering from an integrity test or known answer test failure Document Version.4 McAfee Page 5 of 6

3 Guidance and Secure Operation This section describes how to configure and initialize the module for FIPS- Approved mode of operation. When configured and initialized per this Security Policy, the module will only operate in the FIPS Approved mode of operation. 3. Crypto Guidance 3.. Software Installation The module is included with the McAfee NitroSecurity solution and is not available for direct download. The NitroSecurity software is configured to use the module only in FIPS mode as follows: The first time you log on to the system you will be prompted to select whether or not you want the system to operate in FIPS mode. Keep in mind that once this selection is made it cannot be changed. Detail on selecting FIPS mode can be located in the McAfee Enterprise Security Manager Interface 9..3 Users Guide in section 3.3 (p.38) Selecting FIPS Mode. The McAfee NitroSecurity engineering team is responsible for ensuring the source files that comprise the McAfee SIEM Cryptographic Module, Version.0 are built into the NitroSecurity solution. 3.2 User Guidance 3.2. General Guidance Please see the FIPS relevant sections of the McAfee Enterprise Security Manager Interface 9..3 Users Guide. Throughout the Guide, sections specify where FIPS mode removes or modifies the functionality of a feature. Appendix C of the McAfee Enterprise Security Manager Interface 9..3 Users Guide includes a list of features that should not be enabled when operating in FIPS mode. Document Version.4 McAfee Page 6 of 6